S.No.

Volume 7, Issue 1, January 2018

1.

RDF is Best Technology for Generation of Electricity

Authors: Aditi Sharma, Archana Paranjpe

Abstract- The increase in socio-economic condition during the past ten years has also significantly increased the amount of solid waste generated. The growing amount of municipal solid waste (MSW) and the related problems of waste disposal urge the development of a more sustainable waste management practice. Waste-to- Energy (WTE) technologies – recovering energy in the form of electricity and/or heat from waste are being developed worldwide. The thermo chemical technologies for energetic valorization of calorific waste streams (WTE), with focus on refuse derived fuel (RDF) a processed form of municipal solid waste (MSW). The basic principles of the available technologies and process details of some specific technologies are summarized. Technologically advanced processes (e.g. plasma gasification) receive more attention, with particular focus on the potential for energy recovery (WTE) and material recovery (WTE). The review concludes with an argumentation of the advantages of processing RDF as opposed to MSW, and a comparison between the different technologies, stressing factors affecting their applicability and operational suitability[1]. A comparison of different parameters affecting Waste to Energy technology and a state-wise comparison was conducted along with comparative study of waste-to-energy plants in Jabalpur

References-

[1] O. Raviv, D. Broitman , O. Ayalon , I. Kan, "A regional optimization model for waste-to-energy generation using agricultural vegetative residuals", Article history: Received 3 March 2017 , 2017 Elsevier Ltd. All rights reserved.

[2] N. Srisaenga, N. Tippayawonga, K. Y. Tippayawong," Energetic and economic feasibility of RDF to energy plant for a local Thai municipality", 1st International Conference on Energy and Power, ICEP2016, 14-16 December 2016, RMIT University, Melbourne, Australia.

[3] Sora Yi , Y.C. Jang , and A. Kyoungjin ," Potential for energy recovery and greenhouse gas reduction through waste to-energy technologies", Journal of Cleaner Production (2018), doi: 10.1016/ j.jclepro.2017.12.103.

[4] G. P. Sapuay, " Resource Recovery through RDF: Current Trends in Solid Waste Management in the Philippines ", International Conference on Solid Waste Management, 5IconSWM 2015.

[5] A. Kumar G, Naveen Kumar, Dr.G. Shetty, “A review of recovery of energy from waste”, ISSN: 2319-6890)(online),2347- 5013(print) Volume No.5 Issue: Special 6, pp: 1129 - 1254 20 May 2016 .

[6] S. S. Chauhan , Prof. D. Rastogi, “Utilization Of Municipal Solid Waste Of Gwalior City For Energy Generation (A Case Study)” , Volume: 03 Issue: 07 | July-2016 www.irjet.net p-ISSN: 2395- 0072.

[7] S. Gupta, R. S. Mishra, "Estimation of Electrical Energy Generation from Waste to Energy using Incineration Technology”, Volume 3, Issue 4 (2015) 631-634, ISSN 2347 – 3258, Available online 15 December 2015.

1-5
2.

Survey of Hiding the Information Message through Image Steganography Techniques

Authors: Apeksha, Nitin Choudhary

Abstract- As the unimaginable development of network technologies will increase the communication of knowledge over the channel needs way higher than the bottom level of security. Image steganography is a common technique of concealment info into cowl image by exploitation digital suggests that by applying Least Significant Bit technique stego-image quality may be considerably increased with none overhead and complexness . Previous Steganography algorithms principally focuses on such embedding policy wherever less pre-processing is applied i.e. secrete image secret writing. This paper is essentially uses the DES (encoding algorithmic program with S box mapping that strengthen secret key. The secret image preprocessing is completed by steganography algorithmic program that uses two distinct SBoxes. This preprocessing of secret image offers the algorithm strength no one will extract the data exclusive of knowing the mapping rules and function’s secret key. To get high security, steganography methodology is is combining with a science secret writing decipherment in order that although anyone discover the existence of secret information, it's still not comprehendible. This paper surveys several such algorithms and conjointly will the comparative study of all the techniques along as a section of literature survey.

Keywords- Steganography, Cryptography, DES,LSB Technique, S-Box.

[1] Thorsten Holz Frederic Raynal, ―Detecting Honeypots and other suspicious environments,‖ in Proceedings of IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY 2005.

[2] Abed, Fadhil Salman, and Nada Abdul Aziz Mustafa. "A Proposed Technique for Information Hiding Based on DCT." Int. J. Adv. Comp. Techn. 2.5 (2010): 140-152.

[3] Nath, Asoke, Sankar Das, and Amlan Chakrabarti. "Data Hiding and Retrieval." Computational Intelligence and Communication Networks (CICN), 2010 International Conference on. IEEE, 2010.

[4] Nath, Joyshree, and Asoke Nath. "Advanced Steganography Algorithm using encrypted secret message." International journal of advanced computer science and applications 2.3 (2011).

[5] Das, Debanjan, et al. "An integrated symmetric key cryptography algorithm using Generalised Modified Vernam Cipher method and DJSA method: DJMNA symmetric key algorithm." Information and Communication Technologies (WICT), 2011 World Congress on. IEEE, 2011.

[6] Abed, Fadhil Salman. "A Proposed Encoding and Hiding Text in an Image by using Fractal Image Compression." International Journal on Computer Science and Engineering (IJCSE) 4.01 (2012): 1-13.

[7] Niemiec, Marcin, and Lukasz Machowski. "A new symmetric block cipher based on key-dependent S-boxes." Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2012 4th International Congress on. IEEE, 2012.

[8] Mathur, Akanksha. "A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms." International Journal on Computer Science and Engineering (IJCSE) 4.9 (2012): 1650-1657.

[9] Dey, Somdip. "SD-AREE: An Advanced Modified Caesar Cipher Method to Exclude Repetition from a Message." International Journal of Information and Network Security (IJINS) 1.2 (2012): 67-76.

[10] Ray, Rishav, et al. "A new Challenge of hiding any encrypted secret message inside any Text/ASCII file or in MS word file: RJDA Algorithm." Communication Systems and Network Technologies (CSNT), 2012 International Conference on. IEEE, 2012.

[11] Tang, Xing, and Mingsong Chen. "Design and implementation of information hiding system based on RGB." Consumer Electronics, Communications and Networks (CECNet), 2013 3rd International Conference on. IEEE, 2013 of Standards and Technology, Gaithersburg, September 2011.

[12] Juneja, Mamta, and Parvinder S. Sandhu. "An Improved LSB Based Steganography Technique for RGB Color Images." International Journal of Computer and Communication Engineering 2.4 (2013).

[13] Devi, Kshetrimayum Jenita. ―A Sesure Image Steganography Using LSB Technique and Pseudo Random Encoding Technique‖. Diss. National Institute of Technology-Rourkela, 2013.

[14] Paul, Manas, and Jyotsna Kumar Mandal. "A Novel Symmetric Key Cryptographic Technique at Bit Level Based on Spiral Matrix Concept." arXiv preprint arXiv:1305.0807 (2013).

[15] Wenjie Lin, David Lee,‖ Traceback Attacks in Cloud—Pebbletrace Botnet‖, 32nd International Conference on Distributed Computing Systems Workshops (ICDCSW), Macau 2012 ,june 18-21,pp 417- 426.

[16] Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Fabrizio Baiardi,‖HA-CIDS: A Hierarchical and Autonomous IDS for Cloud Systems‖ In Fifth International Conference on Computational Intelligence, Communication Systems and Networks (CICSyN), Madrid June 5-7Vol 2,pp. 179-184 , 2013.

[17] Ramaiya, Manoj Kumar, Naveen Hemrajani, and Anil Kishore Saxena. "Security improvisation in image steganography using DES." Advance Computing Conference (IACC), 2013 IEEE 3rd International. IEEE, 2013.

[18] Sheng-Wei Lee, Fang Yu,‖Securing KVM-based Cloud Systems via Virtualization Introspection‖, 47th Hawaii International Conference on System Science, Waikoloa, HI, Jan 6-9,pp 5028 – 5037, 2014.

 

6-11
Home
Archives
Scope
Editorial Board
Paper Submission
Conference Publication
Ethics & Policies
Publication Fee
CFP
FAQ
Contact Us